Cybersecurity

  • Period: to

    Cybersecurity Intro

    Our growing dependence on computer systems and the data they contain makes us increasingly exposed to hackers' attacks and prone to losing these systems should there be and accident or natural disaster. Although IT system security's are improved. Despite the fact that IT systems are improving, more complex attack methods are being created.
  • Period: to

    Assessment Outcome 1

    Demonstrate knowledge and understanding of technical language, security threats, system vulnerabilities and security protection methods, and implications resulting from successful threats.
  • Period: to

    Assessment Outcome 3

    Analyse forensic evidence data and information to identify security breaches and manage security incidents.
  • Period: to

    Assessment Outcome 4

    Evaluate protection methods and security documentation to make reasoned judgements and draw conclusions about their efficiency.
  • Period: to

    Assessment Outcome 5

    Be able to plan a secure computer network and manage security incidents with appropriate justifications.
  • Period: to

    Cybersecurity Intro Pt2

    It's also critical that businesses have solid procedures in place to deal with a cybersecurity problem before it happens. All IT workers must have a thorough awareness of current system risks, how to implement suitable and effective security measures, and how to handle a cyber security event.
  • Period: to

    Assessment Outcome 2

    Apply knowledge and understanding of security threats, system vulnerabilities and security protection methods and implications in order to risk assess systems and select appropriate tools to secure them.
  • Period: to

    RECAP (16th September)

    • Cybersecurity intro
    • Cisco Chapter 1 and quiz
  • Period: to

    Lesson Summary (16th September)

    • Vulnerability Database - A vulnerability database is a platform for storing, preserving, and sharing information on computer security flaws that have been found.
    • White, Grey & Black Hat Hackers
    • Vendor Neutral
    • CCAr, CCIE, CCNP, CCNA
  • Period: to

    Lesson Summary (23rd September)

    AAA :
    Authentication- To be able to perform strong authentication, at least two or all three of the authentication methods of something a person knows, something a person has and something a person is must be used
    Authorization - Authorization entails establishing what the authorized identity has access to, thereby determining what they can do.
    Accounting - Accounting cybersecurity practices guarantee that sensitive data is protected
    integrity
    Sneakernet
  • Period: to

    Summary (30th September)

    Malware is installed on the end devices of users by cyber thieves.
    Malware and malicious code- Malware (malicious software) is any programme that is created with the aim of causing harm to a computer, server, client, or network. In contrast, software that causes unintentional harm as a result of a flaw is sometimes referred to as a software bug.
  • Period: to

    RECAP (30th September)

    Authentication- To be able to perform strong authentication, at least two or all three of the authentication methods of something a person knows, something a person has and something a person is must be used
    Authorization - Authorization entails establishing what the authorized identity has access to, thereby determining what they can do.
    Accounting - Accounting cybersecurity practices guarantee that sensitive data is protected
  • Period: to

    Summary (7th October)

    Symmetric encryption encrypts and decrypts an encrypted email using a private key. Asymmetric encryption encrypts the message using the recipient's public key. If the receiver wishes to decode the communication, a private key will be needed.
    Symmetric examples:
    - 3DES
    - IDEA
    - AES
    Asymmetric Examples:
    - RSA (Rivest_Shamir-Adleman)
    - Diffie-Hellman
    - Elgamal
    - Elliptic Curve Cryptography (ECC)
    Access Controls:
    Physical Access Controls
    Logical Access Controls
    Administrative Access Controls
  • Period: to

    RECAP (7th October)

    Malware & Malicious Code
    Viruses - A virus is malicious executable code attached to another executable file, such as a legitimate program. Most viruses require end-user initiation, and can activate at a specific time or date.
    Worms - Worms are malicious code that replicates by independently exploiting vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms can run by themselves.
  • Period: to

    Summary (12th October)

    Steganography is the art of concealing a secret message within (or even on top of) a non-secret object. That something can be anything you want it to be. Many instances of steganography nowadays include hiding a secret piece of text within an image. Alternatively, you might hide a secret message or script inside a Word or Excel document.
    Hashing is a data integrity mechanism that takes binary data (the message) and converts it into a hash value or message digest
  • Period: to

    RECAP (12th October)

    Symmetric encryption encrypts and decrypts an encrypted email using a private key. Asymmetric encryption encrypts the message using the recipient's public key. If the receiver wishes to decode the communication, a private key will be needed.
    Access Controls:
    Physical Access Controls
    Logical Access Controls
    Administrative Access Controls
  • Period: to

    Summary (15th October)

    Converting Binary to Decimals
    Becoming Familiar with Assignments
  • Period: to

    Summary (21st October)

    Binary to Decimals Activity
    Five-nines availability or 99. 999% is the percentage of a time network component or service is accessible to a user in a given period, usually defined as a year.
    Examples:
    - Security
    - NHS
    - Search engines (Google, Yahoo etc.)
    - YouTube
    - Netflix
    A single point of failure is a component in a system that, if it fails, renders the entire system inoperable
  • Period: to

    SUMMARY (4th November)

    Cisco Packet Tracer lab A file transfer protocol (FTP) is a method of downloading, uploading, and transferring data from one point to another over the internet and between computer systems. FTP allows files to be sent back and forth between computers or over the cloud. FTP transfers need users to have an internet connection. Configuring basic server components :
    FTP SERVER
    WEB SERVER
    EMAL SERVER
    DNS SERVER
    NTP SERVER
    AAA SERVER
  • Summary (11th November)

    Summary (11th November)
    Completing Lab1
    Close to completing lab 2
    Starting the workbook revision guide
  • Summary (16th November)

    Introduction to Cybersecurity Test paper
    10 thoughts:
    - Risk assessment - View of the current state of the organization’s security, findings and recommendations for improving its overall security
    - Considering threats, vulnerabilities, risks and protection measures
    - Actions needing to be taken based on the risks
    - reason for action
    - I will need to plan what i will do with the given time
  • Summary (18th November)

    Summary (18th November)
    Cybersecurity and incident management test paper A
    Risk assessment
    Threat 1 Summary
    Mobile Malware -
    Visitors connecting the network, Risk of exposing network to malware whether or not it is accidental
    Threat 2 Summary
    Unauthorized access -
    Not changing the locks makes BCTAA more susceptible to break ins. Mistakes from the previous company regarding can be brought over which is too big of a liability.
  • Period: to

    Recap (18th November)

    Test paper introduction
    Risk assessment - View of the current state of the organization’s security, findings and recommendations for improving its overall security
  • Summary (19th November)

    Summary (19th November)
    The phrase open port is used in security to refer to a TCP or UDP port number that is set to accept packets. Network address translation is a term that refers to the process of translating an IP address into It's a method of mapping numerous private local addresses to a public one before sending data. Most home routers, as well as most businesses, use NAT to allow many devices to share a single IP address. A honeypot is a computer or computer system designed to imitate cyberattack targets.
  • Summary (25th November)

    Summary (25th November)
    Cisco Packet Tracer Lab 4
    Examining the integrity of a number of different sources To confirm that files have not been tampered with, hashes are used. I submitted any files suspected of being tampered with to Sally's computer for additional inspection.
  • Summary (2nd December)

    Summary (2nd December)
    Description too long, added as an image instead*